|Publication number||US6880100 B2|
|Application number||US 09/682,089|
|Publication date||Apr 12, 2005|
|Filing date||Jul 18, 2001|
|Priority date||Jul 18, 2001|
|Also published as||US20030018930|
|Publication number||09682089, 682089, US 6880100 B2, US 6880100B2, US-B2-6880100, US6880100 B2, US6880100B2|
|Inventors||Oscar Mora, Roger Pinate, Roberto Ponticelli|
|Original Assignee||Smartmatic Corp.|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (11), Referenced by (55), Classifications (16), Legal Events (12)|
|External Links: USPTO, USPTO Assignment, Espacenet|
1. Field of Invention
This invention relates to fault detection in a distributed network, and more specifically, to a mechanism for peer-to-peer fault detection.
2. Discussion of Prior Art
In modern systems, a distributed network is defined as a group of systems or nodes, of equal processing capabilities, that can intercommunicate in a networking manner. Each system has its own tasks and processes. Nonetheless, a particular task may require resources available in remote systems, involving the use of a networking environment.
Two clear examples of a distributed network are local area networks (LANs) and distributed control networks. A LAN comprises a group of personal computers, generally controlled by users, that intercommunicate through shared physical media to transfer information among them. In a distributed control network, several similar controllers are programmed to execute a control strategy or algorithm to control a specific process. A complex process is divided into simpler processes suitable for simple control devices, and each controller is responsible for a fraction of the control strategy. The control network coordinates the whole control strategy, since actions performed by a given controller may affect actions performed by a remote controller present in the same control network.
In these examples, close relationships are usually established between nodes, and any node may depend on one or more nodes. For example, a local area network may enclose a personal computer responsible for storing information in the form of a database accessible from remote computers. A distributed control network may include a controller responsible for checking the on/off state of an element of the controlled process and for the propagation of said information to other controllers in the network. In both examples, failure of the provider node (i.e., database server and sensing controller) affects all other nodes that depend on it.
Finding and fixing an inoperative node is a time consuming task. In many cases, the entire system must be stopped to replace or fix the defective node. There is the need for a mechanism to minimize these situations.
Corrective and/or preventive measures can be taken to keep the network in operation. Corrective measures are usually implemented as redundancy. A redundant system involves the use of duplicate equipment (e.g., primary and secondary equipment), such as duplicate physical network lines, power supplies, I/O peripherals, etc. The primary equipment is always in use. In case the primary equipment fails, secondary equipment may become active, and an alarm be sent to the user or operator indicating failure of primary equipment. By this mechanism, defective devices can be replaced without stopping the system.
Although redundancy solves the problem, it involves high equipment costs (due to duplication), despite its infrequent use.
A preventive mechanism proposes a periodical monitoring of every node present in the network to keep track of the status of each node. Then, a failure may be anticipated and a priori fault-correction actions taken with little or no impact due to network failure. The majority of network failures may be avoided by adding special monitoring devices or special diagnosis tests on each node. Compared to redundant measures, this preventive approach represents a cost-effective solution. The preventive approach is the subject of the present invention.
In the recent past, there have been many attempts to solve the monitoring and status report problem. A proposed solution is the addition of special network devices that may ask all or a group of network nodes for their status. Any irregular status or the absence of a response by a node is reported to the user or to another station or system capable of handling such situation. Yet, adding specialized devices embodies a situation similar to the above physical redundancy solution, i.e., Increasing the costs for establishing a reliable network. Furthermore, the failure of the specialized monitoring device represents the failure of the monitoring mechanism itself, since the fault and status detection functions are centralized in such devices.
Rather than using centralized monitoring devices, the fault detection functions may be integrated into the network nodes themselves, thus eliminating the existence of external monitoring devices. Every node may have the capability of checking the operation of all other nodes present in the network, maintaining a dynamic table of existing nodes. In a computer network, for example, this mechanism can be easily supported. However, controllers used in a control network do not always possess enough memory to store a dynamic table. This problem arises as soon as the number of nodes increases, since the size of the dynamic table must be increased too. Furthermore, the computation time needed to check the status of all other nodes increases proportionally with an increase in the number of nodes.
This invention proposes a cost-efficient fault and status detection method suitable for different types of networks, involving low computation time and memory requirements, regardless of the number of nodes in the network.
This invention discloses a method for peer-to-peer fault detection suitable for distributed, shared media networks.
In a distributed network comprising a group of nodes, all of them with equal characteristics and sharing a common communication network supporting point-to-point and broadcast messaging, peer-to-peer logic fault detection is implemented in the form of software routines in which, at network power up, each node finds a pair to establish a peer-to-peer checking mechanism.
Using random or pseudo-random timeout generation along with broadcast messaging, pairs of nodes are gathered until every node has an associated pair (the case of an odd number of nodes is also considered). Depending on network bandwidth and number of formed pairs, a node is assigned a timeout period to periodically send an assessment message to its associated partner node. The partner node must generate and send a status report back to the first node. An irregular status or non-received response is reported to the monitoring station or is stored as a network event for further report when needed.
After certain amount of time, in the order of hours, any node may send a broadcast restart message to request reestablishment of network peer-to-peer pairs.
Accordingly, several objects and advantages of the present invention are: a) To provide a low-cost fault detection mechanism suitable for distributed networks; b) To provide a simple low computation and low memory consumption fault detection mechanism suitable for both high- and low-processing power systems (nodes) in a distributed network; c) To provide a fault detection mechanism in accordance to the number of existent nodes and available bandwidth; d) To provide a mechanism where memory and computation time may be independent from the number of applicable network nodes.
Other objects and advantages of this invention will become apparent from a consideration of the ensuing description and drawings.
Let there be a distributed network comprising a group of equivalent systems, called network nodes, connected to a shared common logic communication channel used to transfer information among them. The present invention requires that each network node support point-to-point and broadcast communication capabilities.
Peer-to-peer fault detection consists of a series of routines, programmed on all nodes, which constitute a fault detection mechanism for a pair of nodes sharing the same network.
Consider the simplest case of a network comprising only two nodes.
After some time, in the order of seconds, Node B 110 b sends a Check message to Node A 110 a requesting its updated status (118 a). In response to the Check message, Node A 110 a replies with a Check message to Node B 110 b (120 a). Any abnormal status or total absence in a Check message response (i.e., indicative of total fault or absence) is reported by Node B 110 b to the user or to another specialized monitoring node, or is stored as a network event for future reports. In the same manner, Node A 110 a may request updated status from Node B 110 b to check for abnormal conditions (118 b, 120 b).
This example is a simple illustration of the invention to introduce the basic concept. The final mechanism contemplates a network comprising N nodes, covers all possibilities for broadcast message generation, considers reattempts to send messages, and includes the case of an odd number of nodes, among other features.
The state diagram shown on
The initial state is represented by a network in the OFF state (210). After a Power ON condition, where all nodes are set online, there are no established pairs so a pair counter variable, Pair_ctr, is set to zero (212). The system changes unconditionally to the next state, and each node expects a broadcast Request message generated by any other node. A decreasing counter present in every node (called Ctr) is set to an initial random or pseudo-random number called Random1 (214). Every node waits until its own Ctr reaches zero before continuing to the next state. (This way, collisions caused by several simultaneous broadcasts are avoided.) If a node's Ctr reaches zero, it changes to the next state 216. Since it received no Request messages, it generates and sends out a broadcast Request message and listens for responses. If a Response1 does not arrive within a timeout period, it resends the Request message a number N_TOUTS of times (i.e., a variable called Retry stores the number of retries to be done). In one implementation, the value of N_TOUTS is three, but this value may be configurable. If the expected Response1 is received, the node switches to the next state 218.
In state 218, a Response2 is sent back to the node from which Response1 was received, using the Retry counter to store retries, and the Response2_ack is expected. If this does not arrive (Retry equals 0), state 214 is assumed and the process is restarted. If the Response2_ack is received, the next state 220 is adopted and a Check address is stored in memory. The Check address is retrieved from the source address of the Response1 message, and a fault-detection pair is established. Since a new pair has been formed, the value of Pair_ctr is increased by one. Before leaving this state, a decreasing timer called Restart_tmr is set to ON. The timeout period of this timer, in the order of hours, indicates when to restart the pair assignation process (see below).
Finally, the node switches to state 222, an Idle State, where a decreasing check timer, Check_tmr, is set to ON. When Check_tmr reaches zero, a Check message requesting the status of the associated partner node is sent (state 242) (see below). Check message generation is performed in every network node, resulting in a slight increase of network traffic as the number of nodes increases. However, the availability of greater network bandwidth allows a greater number of messages by time unit. This is why the initial value of the Check_tmr is directly proportional to the number of nodes (taken from the Pair_ctr) and inversely proportional to the available bandwidth. The initial value of Check_tmr must be recalculated each time Check_tmr reaches zero, since the value of Pair_ctr could change while more pairs are established.
The value of Pair_ctr is not an accurate measure of the existing pairs. Since broadcast messaging is not a reliable information transfer method and the mechanism involves transmission retries, the value of Pair_ctr may vary from node to node. However, Pair_ctr helps to produce an estimate number of established pairs (and nodes) to select an adequate Check_tmr in accordance to network size.
Up to here, the described state diagram covers the case of the node that first broadcasts its Request.
Another case arises when a Request from an external node is detected first (i.e., a transition from state 214 to 224). In this case, a network Request is detected and so Ctr is initialized with a new random or pseudo-random value, random2, before sending a Response1 message. Similar to the assignation of random1 (state 214), this prevents collisions from occurring when several nodes try to respond to a Request simultaneously. Detecting a Response1 answer to the original Request (i.e., coming from a different node) means that a new pair is being formed, so the Pair_ctr is increased by one (228) and the process begins again at state 214. The other case, where Ctr reaches zero, indicates that no other node has answered until that moment, so a Response1 message is generated and sent out (226), using the Retry counter explained on state 216. If the Retry counter reaches zero, this means that the node that originally sent the Request message has already established a pair with any other node, and state returns to state 214 to restart the process. In the other case, the Response2 message is received and a Response2_ack is sent back (227). Finally a pair is established by adopting state 220. From this point and on, the flow is the same as the one explained before.
The processes of establishing a pair either by sending a Request or by answering an external Request with a Response1 have been explained.
The third case arises when there is an odd number of nodes. In this situation, there cannot be a normal answer to a Request message. Returning to state 216, Retry counter reaching zero means that no Response1 message was received, and it is assumed that there are no more free nodes to establish a new pair. A special type of request identifying an unpaired node, called oddRequest, is sent, using again the Retry counter (230). As will be explained later, any paired node has the capability to answer an oddRequest, generating a Response1 message. If the Response1 message is received, an oddResponse2 is sent (232) and a Response2_ack message is expected. Similar to the case of oddRequest, oddResponse2 identifies an unpaired node. The Pair_ctr is increased (even when a new pair is not formed, but a trio). If a Response2_ack is not received (Retry equals 0), state 230 is reached again to send a new oddRequest. Otherwise oddResponse2_ack arrives and an Idle State 2 is adopted (234). This is a final or “dead” state. No Check message has to be sent to the partner node since it already has an associated partner responsible for checking it. Checking an already paired node is unnecessary. Returning to state 230, if Retry counter reaches zero, it means there are no other unpaired nodes on the network and the Idle State 2 (234) is adopted.
Another branch of the diagram is represented by the states responsible for answering an oddRequest message. As was said before, a node can answer an oddRequest from an unpaired node if and only if it is already paired. If so, a node must be in Idle State (222) to be able to detect an oddRequest. When an oddRequest is detected in Idle State 222, state 236 is adopted. As in state 224, a Response1 is expected until Ctr (initialized to random or pseudo-random value random2) reaches zero. If a Response1 is detected before Ctr reaches zero, Pair_ctr is increased by one (237) and Idle State 222 is reached again. However, if Ctr reaches zero, a Response1 is sent (238) using the Retry counter, and an oddResponse2 is expected. If it does not arrive (i.e., Retry reaches zero), another node must have answered the oddRequest first, so the Idle State 222 is adopted. In case the oddResponse2 is received, an oddcheck address identifying the odd node is stored, the Pair_ctr is increased by one (240) and the Response2_ack is sent back. After this state, the Idle State 222 is reached unconditionally.
The final branch on the state diagram starts when the Check_tmr reaches zero in Idle State 222. It indicates that a Check message must be sent (242). If there is an associated odd node as well (i.e., case of a trio), then two Check messages are sent. The Retry counter is used and a Check message response is expected. When the Check message response is received, any abnormal status contained in such response is reported to the monitoring station or is stored as a foreign abnormal node status event (244). The original Idle State 222 is readopted. If the Check message response does not arrive (Retry reaches 0), a complete node failure event is reported (246) or stored, and Idle State 2 234 is adopted.
As explained above, any node's Restart_tmr may signal when to restart (i.e., refresh) the pair establishing process. When Restart_tmr reaches zero, a broadcast Restart message is sent three times indicating to every existing node that new pairs must be formed (248). The Pair_ctr is reset (212) and the mechanism restarts. At the same time, independently from the current state (250), reception of a Restart message on a node generates a restart condition, and state 212 is adopted.
Thus, the reader will see that the peer-to-peer fault detection mechanism shown here provides a simple, cost-effective solution in a distributed network.
Using a model of status and fault detection between pair of nodes, complex programming routines are simplified, reducing memory and computation time consumption. These characteristics make such routines suitable for implementation on both high and low processing power systems, from personal computers down to 8-bit microcontrollers, according to the type of networked systems.
Another advantage is that computation time spent when a node checks the status of its associated partner(s) is not affected by the number of interconnected nodes. Evidently, as the number of nodes increases, there will be more check messages, and network traffic may increase slightly. Adjusting the time interval to send a check message according to the number of nodes and available bandwidth may prevent traffic jams associated to fault detect packet generation.
While our above description contains many specificities, these should not be construed as limitations to the scope of the invention, but rather as an exemplification of one preferred embodiment thereof. Obviously, modifications and alterations will occur to others upon a reading and understanding of this specification such as, for example, establishing trios (or any other combination) instead of pairs to perform status and fault checks. From a node's point of view, this is similar to establishing pairs with two other nodes. The system becomes more robust at the expense of an increase in network traffic. Another variation could be the use of multicast messaging instead of broadcast messaging in order to create different zones using the described peer-to-peer mechanism.
The description above is intended, however, to include all such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US5167035 *||Feb 13, 1992||Nov 24, 1992||Digital Equipment Corporation||Transferring messages between nodes in a network|
|US5452419 *||Mar 6, 1992||Sep 19, 1995||Pitney Bowes Inc.||Serial communication control system between nodes having predetermined intervals for synchronous communications and mediating asynchronous communications for unused time in the predetermined intervals|
|US5696895 *||Jun 19, 1995||Dec 9, 1997||Compaq Computer Corporation||Fault tolerant multiple network servers|
|US5884018 *||Jan 28, 1997||Mar 16, 1999||Tandem Computers Incorporated||Method and apparatus for distributed agreement on processor membership in a multi-processor system|
|US5925137 *||Mar 27, 1997||Jul 20, 1999||Nec Corporation||Alternate routing of management message to simplified network element in a ring network|
|US5926619 *||Jan 5, 1998||Jul 20, 1999||International Business Machines Corporation||Apparatus and program product for recovery of a name server managing membership of a domain of processors in a distributed computing environment|
|US6192483 *||Oct 21, 1997||Feb 20, 2001||Sun Microsystems, Inc.||Data integrity and availability in a distributed computer system|
|US6442713 *||Mar 30, 1999||Aug 27, 2002||International Business Machines Corporation||Cluster node distress signal|
|US6449641 *||Mar 16, 1999||Sep 10, 2002||Sun Microsystems, Inc.||Determining cluster membership in a distributed computer system|
|US6487678 *||Aug 31, 1999||Nov 26, 2002||International Business Machines Corporation||Recovery procedure for a dynamically reconfigured quorum group of processors in a distributed computing system|
|US20020145983 *||Apr 6, 2001||Oct 10, 2002||International Business Machines Corporation||Node shutdown in clustered computer system|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US7162199 *||Jun 21, 2001||Jan 9, 2007||Lockheed Martin Corporation||Method for real-time team coordination with unrealiable communications between team members|
|US7228460 *||Jan 23, 2004||Jun 5, 2007||Hewlett-Packard Development Company, L.P.||Multi-state status reporting for high-availability cluster nodes|
|US7379444 *||Jan 27, 2003||May 27, 2008||International Business Machines Corporation||Method to recover from node failure/recovery incidents in distributed systems in which notification does not occur|
|US7430684 *||Feb 9, 2005||Sep 30, 2008||International Business Machines Corporation||Method to use fabric initialization to test functionality of all inter-chip paths between processors in system|
|US7437595 *||Feb 7, 2005||Oct 14, 2008||International Business Machines Corporation||Row fault detection system|
|US7451342 *||Feb 7, 2005||Nov 11, 2008||International Business Machines Corporation||Bisectional fault detection system|
|US7506197 *||Feb 7, 2005||Mar 17, 2009||International Business Machines Corporation||Multi-directional fault detection system|
|US7529963||Feb 7, 2005||May 5, 2009||International Business Machines Corporation||Cell boundary fault detection system|
|US7571345||Aug 22, 2008||Aug 4, 2009||International Business Machines Corporation||Bisectional fault detection system|
|US7669075||Aug 25, 2008||Feb 23, 2010||International Business Machines Corporation||Row fault detection system|
|US7697443||Apr 13, 2006||Apr 13, 2010||International Business Machines Corporation||Locating hardware faults in a parallel computer|
|US7747895||Jul 1, 2008||Jun 29, 2010||International Business Machines Corporation||Multi-directional fault detection system|
|US7796527 *||Apr 13, 2006||Sep 14, 2010||International Business Machines Corporation||Computer hardware fault administration|
|US7826379 *||Feb 7, 2005||Nov 2, 2010||International Business Machines Corporation||All-to-all sequenced fault detection system|
|US7831866||Aug 2, 2007||Nov 9, 2010||International Business Machines Corporation||Link failure detection in a parallel computer|
|US7840834 *||Jul 1, 2008||Nov 23, 2010||International Business Machines Corporation||Multi-directional fault detection system|
|US7873861||Jun 27, 2008||Jan 18, 2011||International Business Machines Corporation||Apparatus to use fabric initialization to test functionality of all inter-chip paths between processors in system|
|US7930584||Oct 9, 2008||Apr 19, 2011||International Business Machines Corporation||Cell boundary fault detection system|
|US8024618 *||Mar 30, 2007||Sep 20, 2011||Apple Inc.||Multi-client and fabric diagnostics and repair|
|US8112658 *||Aug 25, 2008||Feb 7, 2012||International Business Machines Corporation||Row fault detection system|
|US8116210 *||May 23, 2008||Feb 14, 2012||International Business Machines Corporation||System and program product to recover from node failure/recovery incidents in distributed systems in which notification does not occur|
|US8117502||Aug 22, 2008||Feb 14, 2012||International Business Machines Corporation||Bisectional fault detection system|
|US8495411||Feb 7, 2005||Jul 23, 2013||International Business Machines Corporation||All row, planar fault detection system|
|US8516444||Feb 23, 2006||Aug 20, 2013||International Business Machines Corporation||Debugging a high performance computing program|
|US8756453||Nov 15, 2011||Jun 17, 2014||International Business Machines Corporation||Communication system with diagnostic capabilities|
|US8769089||Nov 15, 2011||Jul 1, 2014||International Business Machines Corporation||Distributed application using diagnostic heartbeating|
|US8813037||Feb 28, 2013||Aug 19, 2014||International Business Machines Corporation||Debugging a high performance computing program|
|US8874974||Nov 15, 2011||Oct 28, 2014||International Business Machines Corporation||Synchronizing a distributed communication system using diagnostic heartbeating|
|US8903893||Nov 15, 2011||Dec 2, 2014||International Business Machines Corporation||Diagnostic heartbeating in a distributed data processing environment|
|US20030149786 *||Feb 6, 2002||Aug 7, 2003||Mark Duffy||Efficient counter retrieval|
|US20040146070 *||Jan 27, 2003||Jul 29, 2004||International Business Machines Corporation||Method to recover from node failure/recovery incidents in distributed sytems in which notification does not occur|
|US20050036483 *||Jul 16, 2004||Feb 17, 2005||Minoru Tomisaka||Method and system for managing programs for web service system|
|US20050188265 *||Jan 23, 2004||Aug 25, 2005||Pomaranski Ken G.||Multi-state status reporting for high-availability cluster nodes|
|US20060176826 *||Feb 7, 2005||Aug 10, 2006||International Business Machines Corporation||All-to-all sequenced fault detection system|
|US20060179268 *||Feb 7, 2005||Aug 10, 2006||International Business Machines Corporation||Row fault detection system|
|US20060179269 *||Feb 7, 2005||Aug 10, 2006||International Business Machines Corporation||Multi-directional fault detection system|
|US20060179270 *||Feb 7, 2005||Aug 10, 2006||International Business Machines Corporation||All row, planar fault detection system|
|US20060179271 *||Feb 7, 2005||Aug 10, 2006||International Business Machines Corporation||Bisectional fault detection system|
|US20060179356 *||Feb 9, 2005||Aug 10, 2006||International Business Machines Corporation||Method to use fabric initialization to test functionality of all inter-chip paths between processors in system|
|US20060179361 *||Feb 7, 2005||Aug 10, 2006||International Business Machines Corporation||Cell boundary fault detection system|
|US20070234294 *||Feb 23, 2006||Oct 4, 2007||International Business Machines Corporation||Debugging a high performance computing program|
|US20070242611 *||Apr 13, 2006||Oct 18, 2007||Archer Charles J||Computer Hardware Fault Diagnosis|
|US20070242685 *||Apr 13, 2006||Oct 18, 2007||Archer Charles J||Locating Hardware Faults in a Parallel Computer|
|US20070260909 *||Apr 13, 2006||Nov 8, 2007||Archer Charles J||Computer Hardware Fault Administration|
|US20080259816 *||Apr 19, 2007||Oct 23, 2008||Archer Charles J||Validating a Cabling Topology in a Distributed Computing System|
|US20080270852 *||Jul 1, 2008||Oct 30, 2008||International Business Machines Corporation||Multi-directional fault detection system|
|US20080288820 *||Jul 1, 2008||Nov 20, 2008||International Business Machines Corporation||Multi-directional fault detection system|
|US20080313506 *||Aug 22, 2008||Dec 18, 2008||International Business Machines Corporation||Bisectional fault detection system|
|US20080320329 *||Aug 25, 2008||Dec 25, 2008||International Business Machines Corporation||Row fault detection system|
|US20080320330 *||Aug 25, 2008||Dec 25, 2008||International Business Machines Corporation||Row fault detection system|
|US20090037773 *||Aug 2, 2007||Feb 5, 2009||Archer Charles J||Link Failure Detection in a Parallel Computer|
|US20090044052 *||Oct 9, 2008||Feb 12, 2009||International Business Machines Corporation||Cell boundary fault detection system|
|US20100318835 *||Aug 22, 2008||Dec 16, 2010||International Business Machines Corporation||Bisectional fault detection system|
|US20110153391 *||Dec 21, 2009||Jun 23, 2011||Michael Tenbrock||Peer-to-peer privacy panel for audience measurement|
|US20130232198 *||Dec 27, 2012||Sep 5, 2013||Arbitron Inc.||System and Method for Peer-to-Peer Distribution of Media Exposure Data|
|U.S. Classification||714/4.21, 714/11, 709/224, 714/43|
|International Classification||G06F11/00, H04L29/08, H04L29/14|
|Cooperative Classification||H04L69/329, H04L67/104, H04L69/40, H04L67/1048, G06F11/0757|
|European Classification||H04L29/08N9P1A2, H04L29/08N9P, H04L29/14, H04L29/08A7|
|Oct 20, 2008||REMI||Maintenance fee reminder mailed|
|Apr 12, 2009||REIN||Reinstatement after maintenance fee payment confirmed|
|Jun 2, 2009||FP||Expired due to failure to pay maintenance fee|
Effective date: 20090412
|Jan 10, 2011||PRDP||Patent reinstated due to the acceptance of a late maintenance fee|
Effective date: 20110114
|Jan 14, 2011||FPAY||Fee payment|
Year of fee payment: 4
|Jan 14, 2011||SULP||Surcharge for late payment|
|Nov 26, 2012||REMI||Maintenance fee reminder mailed|
|Apr 12, 2013||LAPS||Lapse for failure to pay maintenance fees|
|Apr 12, 2013||REIN||Reinstatement after maintenance fee payment confirmed|
|Jun 4, 2013||FP||Expired due to failure to pay maintenance fee|
Effective date: 20130412
|Feb 10, 2014||PRDP||Patent reinstated due to the acceptance of a late maintenance fee|
Effective date: 20140216
|Feb 15, 2014||FPAY||Fee payment|
Year of fee payment: 8